Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Infosec Problems For 2019 and Beyond: Patching, Bug Bounties and Hype

Details of a Virtual Box 0-day privilege escalation bug were disclosed on GitHub earlier this week. This was the work of independent Russian security researcher Sergey Zelenyuk, who revealed the vulnerability without any vendor coordination as a form of protest against the current state of security research and bug bounty programs.

Cronview

Throughout my years working with Unix flavoured environments, one of the headaches I’ve had to deal with is cron. Don’t get me wrong, I love cron, it’s a necessity for any operation of such servers, however, there usually comes a point when the size of list reaches a critical mass that makes visualising the execution times a challenge.

A Non-Partisan Threat: Cybersecurity and its Impact on Democracy

As part of Cybersecurity Awareness Month, Lookout held a special briefing sponsored by Rep. Ted Lieu and Rep. Jim Longevin, that focused on how cybersecurity attacks can impact the entire democratic process -- from political campaigns and elections to journalists, lobbyists and activists that participate in the process. The session included a live demo of how a cyberattack could happen on a mobile device.

Egnyte Connect for Desktop 3.0: Design Meets Functionality

The first thing most of us notice after a major software update is a completely redesigned user interface. However, a new user experience is typically the result of a shift in product focus. In version 2.0, our primary focus was on intelligent data retrieval. The idea was to allow users to work on any file in the same way they would for files stored on their machine(s).

The Real Science Behind Data Quality

We’re constantly reminded of just how much data impacts our lives, from influencing elections around the world to monitoring employees at work. But there are many more situations we rarely hear about, like the competitors in the Esport championships using data to win a multi-million dollar prize. As technology writer Andrew Wooden puts it, “data has become, quite literally, a game changer.”

Financial Data and Analysis Predictions for 2019

The use of big data and data from the internet of things (IoT) is changing business so rapidly it is hard to predict what is next, and financial analytics are certainly no exception. While the need for financial analysts continues to rise, the way analysts performs their day-to-day functions is evolving.

Third-Party Credentials and Vendor Risk: Safeguard Your Applications

Your primary systems aren’t the only source of damaging exposed credentials. Third-party applications employed by your organization also have privileged logins that must be protected. Cloud platforms, software as a service (SaaS), and local third party applications such as ERP systems often have administrative logins with full control.